Probing Postman Passwords with Playwright and Postdigger Adversis sampled over 8,000 API collections from over 2,000 teams from Postman and found that around 40% or 853 users had some kind of API token or password exposed.
High-Speed Assurance: Security as IT’s Essential Co-Driver This one's for our Small to Medium Businesses and Enterprises who may not have centralized management or a dedicated internal IT team. Either way you might enjoy the rally driving.
Incident Response Policies, Procedures & Playbooks The terms 'Policies', 'Procedures', and 'Playbooks' are often used to establish guidelines and standard practices. They're related but serve different purposes. Here's how they work and interact.
Cracking the Cybersecurity Conundrum: Bridging the Gap Between Profit and Protection The current economic dynamics of the cybersecurity sector, explore the potential for a change in paradigm towards one that mirrors the introduction of building codes in the construction industry, thus raising the bar on accountability and proactive defense for tech companies.
2023 Data Breach Chronicles: Read it and Weep (or laugh)! Adversis breaks down the Verizon Data Breach Investigations Report.
Homebrew for Initial Access: Simple yet Effective Homebrew for initial access. It's a way to initial access with Homebrew.
The Intriguing World of Ransomware Payments: Exploring Crypto, Hacker Hideouts, and the Art of Cashing Out Dive into the mysterious world of ransomware payments! Learn about how hackers use digital money like Bitcoin, where they hide, and the sneaky ways they turn stolen money into real cash. Learn about real-life examples of how these cybercriminals operate.
Unraveling the Secrets of Montana's Internet 20% of the internet in Montana has critical vulnerabilities. Webcams are showing people's homes, businesses, and libraries. Computers, water pumps and wells, databases, and Content Management Systems are exposed. There's a lot to unpack here.
Is your MSP secure? Hiring a Managed Service Provider (MSP) can be a great way for small businesses to outsource their IT needs and protect their systems and information. However, it's important to make sure that the MSP you choose is capable of providing the level of protection your business needs. In this blog
Do These 5 Simple Things to Defend Against Drive By Hacking Stay ahead of hackers. Let them target your competitors.
A BigCommerce Security Primer BigCommerce is an eCommerce platform that quite a few large brands use. Let's take a look at how to make sure our BigCommerce store is configured securely. Enable Multi-Factor Authentication MFA is easily the most important thing you can do today to secure your accounts. BigCommerce makes it incredibly easy.
Your Documents, ShareFile'd Adversis did some brief public research on Citrix ShareFile websites and found over 9,000 customer subdomains, over half of which have links accessible to anyone who can identify them. It’s possible your company is among them.
Your SSN Isn't a Secret Your Social Security Number is not supposed to be sensitive. It's an ID, nothing more. Unfortunately, more and more platforms and online systems use it to verify your identity.
A Safe and Sound Shopify Shop So you've opened a Shopify store. That's great news! Chances are, you're making something really special and we're excited to help make you and your customers experience secure.
Your Reconciliation Nightmare - How Attackers Target Payment Flows Payment Flows. Thanks to platforms like Stripe, they are incredibly simple to implement and manage.
Adversis - The Beginning of Something.. It was cold in Washington DC that January. Noah and I were taking a SANS training (SANS is the leader in cyber security training). The course we were taking is one of the most advanced Penetration Testing courses SANS offers, the topics cover cutting-edge hacking techniques that many enterprise cyber
ForeScout Secure Connector Local Privilege Escalation A local privilege escalation in a security tool, who would have imagined..
Pandora's Box: Another New Way to Leak All Your Sensitive Data Yes, the cloud is still leaking data. This time, we can't blame the SRE team though, everyone has been sharing files publicly, yes, even you probably.